期刊问答网 论文发表 期刊发表 期刊问答
  • 回答数

    3

  • 浏览数

    138

xsfeng
首页 > 期刊问答网 > 期刊问答 > 关于病毒的论文500字开头英语翻译

3个回答 默认排序1
  • 默认排序
  • 按时间排序

安东尼小姐

已采纳
古语有云:“万恶毒为首”。我们身为祖国的花朵有责任担起拒绝毒品的重任。毒品能麻醉人体的神经中枢系统,大量吸食会导致死亡。那么毒品对我们来说,既熟悉又陌生。熟悉的是经过多方面的宣传,我们对毒品有了一定程度的认识;陌生的是没有尝试过毒品的滋味。不错,正是因为这一种好奇心,不少人成为了如恶魔般的毒品的奴隶。作为祖国未来栋梁的我们,不但要远离毒品,而且拒绝它。As the saying goes: "the evil poison led" We are the flowers of the motherland are heavy responsibility bear to reject Anesthesia drugs to the central nervous system of the human body, a lot of smoking will lead to So drugs for us, both familiar and Familiar with is through the various aspects of publicity, we have a certain degree of understanding of the drug; strange is not tried Well, it is because of this kind of curiosity, many people become a devilish drug As the future pillars of our country, not only to stay away from drugs, but also rejected

关于病毒的论文500字开头英语翻译

340 评论(13)

binbin3

灰鸽子 病毒Gray is a well-known dove back Compared to the older ice, black, gray pigeon can be said to be the back door of the home are a combination of different The rich and powerful functionality and flexibility of operation, well hidden so that others are to be outshone by the back Client simple and convenient to operate so that the entry of just a beginner can act as When used in legal cases, the gray pigeon is a good remote control However, if some of it to do illegal things, gray pigeons have become very powerful hacking This is like powder, on various occasions, brought Gray dove to the complete presentation may be only a gray pigeon author to make it clear that we are here only for a Gray Pigeon client and server are based on the preparation of D Hackers use of the client to configure a server Can be configured to include information on the type of line (for example, wait for the connection or take the initiative to connect), take the initiative to connect using the public network IP (domain name), a password to connect, the use of the port, the start of the name, the name of the service, the process of hidden ways, the use of the Shell, agents, icons and so Server for the client to connect a variety of ways, making the environment in a variety of network users may be poisoning, including local area network users (Internet through a proxy), the public network and ADSL users to dial-up As the gray dove to intercept the API call, in the normal mode file server and its services are registered to hide, that is to say, even if you set up a "show all hidden files" do not see In addition, the gray-end services doves of the file name can be customized, hand-All this has brought about the detection of certain
However, through careful observation, we found that the detection of gray pigeons still have to follow the From the above analysis we can see that principle to run, regardless of the custom server-side file name is what will normally be installed in the operating system directory in order to generate a "_dll" at the end of the Through this, we can more accurately detect the hand-gray-end services
Due to the normal mode will hide their gray pigeons, so detection of gray pigeons must operate in a safe Into the safe mode is: Start the computer in the Windows system into the start screen, press the F8 key (or in your computer holding down the Ctrl key), in the event of the start-up options menu, select "Safe Mode" Or "Safe M"
1, dove gray as a result of the document itself has hidden attributes, so set Windows to show all Open "My Computer" menu, select "Tools" - "" Folder Options ", click" view "to remove" hide protected operating system files "before the Duigou, and the" hidden files and folders " Select the item "Show hidden files and folders," then click "OK"
2, open the Windows "search files", enter the file name "_dll", the search location to choose the Windows installation directory (for 98/xp default C: / windows, 2k/NT for the C: / Winnt)
3, after a search, we have Windows directory (does not contain a subdirectory), the discovery of a document Game_H
4, according to the analysis of the principle of gray pigeons, we know that if it is gray pigeons Game_HDLL documents, the operating system is installed in the directory will be Gxe and Gdll Open the Windows directory, there are really two documents at the same time there is a record for keyboard operation GameKdll
After a few steps which we operate on the basic of these documents can be gray-end services doves of
281 评论(8)

闪耀利箭

电脑病毒的编年史谁打开了潘多拉的魔盒显然,在巴贝奇的差分机上不存在任何病毒,早期基于电子管的电子计算机,比如说埃利亚特,也不可能有电脑病毒存在。但是Univac 1108,一个很古老的公司,一种很古老的机器,以及IBM360/370机器上,已经有一些可以看成是病毒的程序存在,比如“流浪的野兽” (Pervading Animal) 和 “圣诞树”(Christmas tree),因此,可以认为最早的病毒出现在七十年代初甚至六十年代末,虽然那时候没有任何人称这些程序为病毒。一般意义上的病毒(可以运行在IBM PC机及其兼容机上)一般认为是在1986年左右出现的。从那以后的十五年时间里,出现了大概6万余种病毒,病毒的数量不断增大,和病毒制作的技术也逐步提高,从某种意义上,病毒是所有软件中最先利用操作系统底层功能,以及最先采用了复杂的加密和反跟踪技术的软件之一,病毒技术发展的历史,就是软件技术发展的历史。下面我们将尽可能详细的描述病毒发展历史上的重要事件,以及这些事件的背景。萌芽时期,磁芯大战五十年代末六十年代初,在著名的美国电话电报公司(AT&T)下设的贝尔实验室里,三个年轻的程序员:道格拉斯、维索斯基和罗伯特•莫里斯,在工作之余编制了一个叫“磁芯大战” (core war)的游戏。“磁芯大战”基本的玩法就是想办法通过复制自身来摆脱对方的控制并取得最终的胜利,这可谓病毒的第一个雏形。虽然由于这种自我复制是在一个特定的受控环境下进行的,所以不能认为是真正意义上的病毒,但是这些软件的基本行为和后来的电脑病毒已经非常类似了。六十年代晚期到七十年代早期:这个时候是大型电脑的时代,就是那种占据了几个房间的大家伙。在大型电脑时代,由于开发人员的错误或者是出于恶作剧的目的,一些程序员制作了被称为“兔子”的程序,他们在系统中分裂出替身,占用系统资源,影响正常的工作,但是这些“兔子”很少在系统之间相互拷贝。这个时期,在一种型号的大型电脑—Univax 1108系统上,首次出现了和现代病毒本质上是一样的东西,一个叫做“流浪的野兽”(Pervading Animal)的程序可以将自己附着到其它程序的最后!……………………详情请看参考资料,太多了(字数已经超过了规定,发不上来),非常好的一篇文章,是至今为止,我看到的最全面的一篇关于电脑病毒的文章
303 评论(11)

相关问答